General

  • Target

    0fe8469cbae130d45ae34e6c0a5c234928ad3776c4999ef03f065f960729408d

  • Size

    184KB

  • Sample

    220604-re4s5aefcn

  • MD5

    86904bef92845b067a76d08ade4cc08b

  • SHA1

    33ce7286d3a5f2cea3c5197e63fcbbc6effa026a

  • SHA256

    0fe8469cbae130d45ae34e6c0a5c234928ad3776c4999ef03f065f960729408d

  • SHA512

    7db74feff0246d8d5564cccbd23dcc555147881c7733f79c6013f9dcfae4f5f8d2fdde28722794665c73fdf85dd5f5d0a895fb9372dcc6fe0170b51cf1b293e2

Malware Config

Extracted

Family

tofsee

C2

103.232.222.57

111.121.193.242

123.249.0.22

Targets

    • Target

      0fe8469cbae130d45ae34e6c0a5c234928ad3776c4999ef03f065f960729408d

    • Size

      184KB

    • MD5

      86904bef92845b067a76d08ade4cc08b

    • SHA1

      33ce7286d3a5f2cea3c5197e63fcbbc6effa026a

    • SHA256

      0fe8469cbae130d45ae34e6c0a5c234928ad3776c4999ef03f065f960729408d

    • SHA512

      7db74feff0246d8d5564cccbd23dcc555147881c7733f79c6013f9dcfae4f5f8d2fdde28722794665c73fdf85dd5f5d0a895fb9372dcc6fe0170b51cf1b293e2

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks